In uftpd before 2.12, handle_CWD in ftpcmd.c mishandled the path provided by the user, causing a NULL pointer dereference and denial of service, as demonstrated by a CWD /.. command.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://github.com/troglobit/uftpd/issues/30 | third party advisory exploit |
https://bugs.gentoo.org/726308 | third party advisory patch |
https://github.com/troglobit/uftpd/releases/tag/v2.12 | third party advisory release notes |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00052.html | vendor advisory |